PROG1225 Practice Quiz 2
100 Questions
8 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What command is used to switch to the root user in Linux?

  • sudo Command
  • su Command (correct)
  • switchuser Command
  • adminuser Command
  • In Windows 10, what can be found in the Process Tab of Task Manager?

  • Installed applications list
  • System configuration settings
  • Network connection details
  • Currently running processes and resource utilization (correct)
  • What type of commands in Linux typically require superuser privileges?

  • Only network-related commands
  • None of the commands
  • Most commands (correct)
  • Only file management commands
  • What is the purpose of the sudo command in Linux?

    <p>To execute commands with administrative rights</p> Signup and view all the answers

    Which command is used to attach a file system to a directory in Linux?

    <p>mount</p> Signup and view all the answers

    What file is used to create mount entries for other storage devices for automatic mounting in Linux?

    <p>/etc/fstab</p> Signup and view all the answers

    Which command is used to determine the device to mount in Linux?

    <p>fdisk -l</p> Signup and view all the answers

    What type of links in Linux create multiple copies of the same file linked together?

    <p>hard links</p> Signup and view all the answers

    What does the top command display?

    <p>Real-time system statistics with a 5-second delay</p> Signup and view all the answers

    What is the purpose of the /proc directory in Linux?

    <p>Provides runtime system information</p> Signup and view all the answers

    What does the vmstat command report on?

    <p>Process status, memory consumption, paging activity, I/O operations, and CPU usage</p> Signup and view all the answers

    What is the equivalent of the fsck command in Windows?

    <p>chkdsk command</p> Signup and view all the answers

    Which log file contains information and error messages generated by the cron and at daemons?

    <p>secure</p> Signup and view all the answers

    Which log file provides detailed information regarding daemon startup and system messages?

    <p>messages</p> Signup and view all the answers

    Which package manager uses the 'rpm' command?

    <p>Red Hat Package Manager</p> Signup and view all the answers

    What type of files must be compiled on the local computer before use?

    <p>Source code files</p> Signup and view all the answers

    Which tool in Windows Task Manager allows users to view and manage system programs running in the background?

    <p>Services tab</p> Signup and view all the answers

    What does the ps command in Linux do?

    <p>Lists system processes, their owners, and resource usage</p> Signup and view all the answers

    What is the purpose of the Performance Monitor in Windows 10?

    <p>Collects real-time data about a system's usage activities</p> Signup and view all the answers

    What information does the Resources tab in the GNOME System Monitor display?

    <p>Displays usage history of CPU, memory, swap memory, and network</p> Signup and view all the answers

    What are the three basic steps in networking communication?

    <p>Finding the other computer, agreeing on protocols, making requests</p> Signup and view all the answers

    What is the group of protocols used for almost all networks today, including the Internet?

    <p>TCP/IP (Transmission Control Protocol/Internet Protocol)</p> Signup and view all the answers

    In the client/server model, which computer takes on the role of making requests?

    <p>The client computer</p> Signup and view all the answers

    At which level does the hardware for network communication consist of a network card and connection to the network?

    <p>Hardware Level</p> Signup and view all the answers

    What is the first step in network communication when two devices communicate?

    <p>One computer must find the other</p> Signup and view all the answers

    What is the purpose of a MAC address in a local area network (LAN)?

    <p>To locate a computer on the LAN</p> Signup and view all the answers

    Which layer of the OSI Reference Model is responsible for sending bits via transmission?

    <p>Physical Layer</p> Signup and view all the answers

    What protocol is used by the Network Layer to move messages from one node to another?

    <p>IP protocol</p> Signup and view all the answers

    Which protocol is used by the Transport Layer for guaranteed delivery of application layer payloads?

    <p>TCP</p> Signup and view all the answers

    What is the primary function of an IP address in network communication?

    <p>To find computers on the Internet and local networks</p> Signup and view all the answers

    Which layer of the TCP/IP model is responsible for logical addressing and routing?

    <p>Network layer</p> Signup and view all the answers

    Which protocol is commonly used for secure file transfer over a network?

    <p>SSH</p> Signup and view all the answers

    What is the primary function of DNS in TCP/IP networking?

    <p>Resolving domain names to IP addresses</p> Signup and view all the answers

    Which type of IP address is used for communication within a local network and is not routable on the internet?

    <p>Private IP address</p> Signup and view all the answers

    What is the unique feature of IPv6 that provides a direct connection between two nodes on a network without the need for a separate infrastructure?

    <p>Link</p> Signup and view all the answers

    What type of address in IPv6 specifies a single node on a network?

    <p>Global address</p> Signup and view all the answers

    Which type of IPv6 address can identify multiple destinations, with packets delivered to the closest destination?

    <p>Anycast address</p> Signup and view all the answers

    What is the purpose of a fully qualified domain name (FQDN)?

    <p>Identifies a computer and the network to which it belongs</p> Signup and view all the answers

    What does the DNS protocol do?

    <p>Finds an IP address for a computer when the fully qualified domain name is known</p> Signup and view all the answers

    What is the purpose of unique local addresses in IPv6?

    <p>To provide private addresses that can travel across subnets within the private network</p> Signup and view all the answers

    What does a PAN (Personal Area Network) consist of?

    <p>Personal devices communicating at close range</p> Signup and view all the answers

    What technology is commonly used in a LAN (Local Area Network)?

    <p>Wi-Fi</p> Signup and view all the answers

    What does a WLAN (Wireless LAN) cater to?

    <p>Where network cabling is inconvenient to install or use</p> Signup and view all the answers

    What does a MAN (Metropolitan Area Network) cover?

    <p>Large campus or city</p> Signup and view all the answers

    What does a WAN (Wide Area Network) cover?

    <p>A large area and is made up of many smaller networks</p> Signup and view all the answers

    What are some technologies used to connect a single computer or LAN to the Internet?

    <p>DSL, cable Internet, satellite, cellular, and fiber optic</p> Signup and view all the answers

    What is the maximum speed of a dedicated fiber optic line?

    <p>43 Tbps</p> Signup and view all the answers

    What is the speed range of 3G cellular connections?

    <p>200 Kbps to 4 Mbps</p> Signup and view all the answers

    Which networking hardware transmits data only to the intended device?

    <p>Switches</p> Signup and view all the answers

    What is the speed range of 4G cellular connections?

    <p>100 Mbps to 1 Gbps</p> Signup and view all the answers

    Which network topology is most commonly used?

    <p>Star-bus</p> Signup and view all the answers

    What is the speed range of satellite connections?

    <p>Up to 15 Mbps</p> Signup and view all the answers

    What is the main role of NAS (Network Attached Storage) in a local area network?

    <p>Providing fault tolerant data storage</p> Signup and view all the answers

    Which RAID level provides both fault tolerance and improved performance?

    <p>RAID Level 5 – Blocked Data with Distributed Parity</p> Signup and view all the answers

    What is the main difference between SCSI (Small Computer System Interface) and SAS (Serial Attached SCSI)?

    <p>SAS is a serial storage technology, while SCSI is a parallel storage technology</p> Signup and view all the answers

    What is the main purpose of FCoE (Fiber Channel over Ethernet) in network environments?

    <p>Allowing FC to use Ethernet devices while saving costs</p> Signup and view all the answers

    What is the primary function of iSCSI (Internet SCSI) in a SAN (Storage Area Network)?

    <p>Allowing fast transmissions over LANs, WANs, and the Internet</p> Signup and view all the answers

    What is the main function of a UPS (Uninterruptible Power Supply) in a computer system?

    <p>Raising voltage during brownouts, acting as a surge suppressor, and providing battery backup</p> Signup and view all the answers

    What is the purpose of redundant hardware in networking and server environments?

    <p>Ensuring continued operation in case of component failure</p> Signup and view all the answers

    What is the primary function of tape drives in a computer system?

    <p>Backing up data</p> Signup and view all the answers

    What is the main difference between a server OS and a desktop OS?

    <p>Server OS can take on a particular role more effectively</p> Signup and view all the answers

    What is the structure of a computer name on the Internet called?

    <p>FQDN (Fully Qualified Domain Name)</p> Signup and view all the answers

    What is the DNS (Domain Name System) primarily composed of?

    <p>Computer name and IP address pairs</p> Signup and view all the answers

    What is the DNS naming hierarchy best described as?

    <p>An inverted tree with the root at the top</p> Signup and view all the answers

    What is the main characteristic of the DNS (Domain Name System) lookup process?

    <p>It often requires a series of queries to a hierarchy of DNS servers</p> Signup and view all the answers

    Which server role is responsible for accepting email and routing it over the Internet using the SMTP protocol?

    <p>Email Server</p> Signup and view all the answers

    Which protocol is commonly used for secure file transfer over a network?

    <p>FTP</p> Signup and view all the answers

    What is the primary function of a Proxy Server?

    <p>Filtering requests and improving performance</p> Signup and view all the answers

    What is the primary function of an NTP (Network Time Protocol) Server?

    <p>Serving 'correct' time and date requests</p> Signup and view all the answers

    Which server role is responsible for coordinating common configuration files across multiple computers in a LAN?

    <p>NIS (Network Information Service) Server</p> Signup and view all the answers

    What is the primary function of DHCP in networking?

    <p>Assigning IP addresses automatically from a defined pool</p> Signup and view all the answers

    What is the role of Root Servers in DNS?

    <p>Managing top-level domain names</p> Signup and view all the answers

    What is the purpose of Forward Lookup Zone (FLZ) in DNS?

    <p>Mapping domain names to IP addresses</p> Signup and view all the answers

    What is the main function of a DNS server?

    <p>Resolving domain names to IP addresses</p> Signup and view all the answers

    What is the DNS lookup process?

    <p>Involves iterative and recursive queries</p> Signup and view all the answers

    What is the purpose of the DHCPREQUEST packet in the DHCP address assignment process?

    <p>To accept the offered IP address from the DHCP server</p> Signup and view all the answers

    In IPv6, how can the network ID (prefix) be assigned?

    <p>Through stateless or stateful autoconfiguration or DHCPv6</p> Signup and view all the answers

    What does DHCPv6 provide in IPv6 environments?

    <p>Address assignment and management</p> Signup and view all the answers

    When does the lease renewal process involve a DHCPREQUEST packet?

    <p>When the lease is 50% expired</p> Signup and view all the answers

    How can the IPv6 interface ID be assigned?

    <p>Using the MAC address, randomly generated permanent or temporary identifiers, DHCPv6, or manual entry</p> Signup and view all the answers

    What is the purpose of the /etc/passwd file in Linux?

    <p>To describe user accounts</p> Signup and view all the answers

    What is the function of the pwconv command in Linux?

    <p>To revert from using two files to one for user information</p> Signup and view all the answers

    What is the primary purpose of the shadow file (/etc/shadow) in Linux?

    <p>To contain the encrypted password and expiration information</p> Signup and view all the answers

    What is the significance of authenticating user credentials in a Linux system?

    <p>To grant access to the operating system based on user account</p> Signup and view all the answers

    Which file contains encrypted passwords and password expiration details in Linux?

    <p>shadow file</p> Signup and view all the answers

    Which command is used to create user accounts in Linux?

    <p>useradd</p> Signup and view all the answers

    What command is used to modify user account information in Linux?

    <p>usermod</p> Signup and view all the answers

    Which command is used to add a group in Linux?

    <p>groupadd</p> Signup and view all the answers

    Which command is used to set the default printer for all users in CUPS?

    <p>lpadmin</p> Signup and view all the answers

    Where are the log files for troubleshooting typically stored in Linux?

    <p>/var/log</p> Signup and view all the answers

    Which network construct is used for communication between processes by logging daemons?

    <p>Socket</p> Signup and view all the answers

    What is the recommended command to use to retain firewall rules beyond shutdown in Linux?

    <p>service iptables save</p> Signup and view all the answers

    Which command is used to manage zones and firewall rules for traffic by service or port number in Linux?

    <p>firewall-cmd</p> Signup and view all the answers

    What does SUID (Set owner User ID up on execution) allow in Linux?

    <p>Execution as the root user</p> Signup and view all the answers

    Which encryption algorithm is commonly used in Linux for SSH and GPG?

    <p>RSA</p> Signup and view all the answers

    Which utilities help monitor system performance in Linux?

    <p>mpstat, iostat, sysstat</p> Signup and view all the answers

    Which command is used to decompress files in Linux?

    <p>gzip -d</p> Signup and view all the answers

    Which command is used to create, extract, and compress archives in Linux?

    <p>tar</p> Signup and view all the answers

    Which remote administration method for Linux servers is a secure replacement for telnet and allows for GUI?

    <p>SSH</p> Signup and view all the answers

    Which printing system is a common printing system used on Linux computers?

    <p>CUPS</p> Signup and view all the answers

    Study Notes

    Monitoring System Performance in Windows and Linux

    • Windows Task Manager provides a Performance tab that gives a quick view of CPU, memory, disk, and network usage.
    • The App History tab in Windows Task Manager shows usage history for Windows Store applications only, but this can be changed to show history for all processes.
    • The Startup tab in Windows Task Manager shows which programs start automatically during system log-in and allows users to disable certain programs from starting up.
    • The Users tab in Windows Task Manager shows the resources used by the user's account, other users on the system, and allows switching to other user sessions.
    • The Services tab in Windows Task Manager allows users to view and manage system programs running in the background.
    • Most Linux environments provide a system monitor, like the GNOME System Monitor, which monitors system processes, manipulates running applications, and displays resource usage history.
    • The Processes tab in the GNOME System Monitor lists all processes running on the system and provides options to control displayed processes and view dependencies.
    • The Resources tab in the GNOME System Monitor displays usage history of CPU, memory, swap memory, and network, and the File Systems tab includes information about disk space usage and file system type.
    • The ps command in Linux lists system processes, their owners, and the amount of system resources being used, and assigns a Process ID (PID) to each process.
    • The kill command in Linux is used to stop a process, with options like kill PID, kill -9 PID, and kill -SIGHUP PID, each serving different purposes.
    • Performance monitoring tools are used to collect real-time data about a system's usage activities, establish performance baselines, and investigate potential system problems and bottlenecks.
    • In Windows 10, Performance Monitor can be used to collect and view real-time data about a system's usage activities, including monitoring disk performance, managing memory, and monitoring processor use.

    TCP/IP Networking Overview

    • Most tasks performed by the OS when an application makes an API call to the OS
    • OSI Model and TCP/IP Model layers and their relation
    • TCP/IP layers and their functions: Application, Transport, Network, Network Interface
    • Common TCP/IP protocols and their functions: HTTP, HTTPS, SMTP, POP, IMAP, Telnet, LDAP, FTP, SSH, SNMP, RDP, DNS, DHCP
    • IP addresses: Static, Dynamic, IPv4, IPv6, private IP addresses, subnet masks, APIPA
    • IPv6 format and its unique features: link, interface, interface ID, neighbors
    • Usage of the TCP/IP suite of protocols embedded in the OS
    • Process of encapsulation and decapsulation in TCP/IP layers
    • HTTP and HTTPS protocols and their respective port numbers
    • DNS and DHCP protocols and their respective port numbers
    • SNMP and RDP protocols and their respective port numbers
    • FTP and SSH protocols and their respective port numbers

    Types of Network Connections and Hardware

    • Networks are built using various technologies with different bandwidth capacities, measured in Kbps, Mbps, Gbps, Tbps, Pbps, Ebps, Zbps, and Ybps.
    • Data throughput represents the average speed, while latency accounts for delays in network transmissions.
    • Cellular connections include 3G (200 Kbps to 4 Mbps) and 4G (100 Mbps to 1 Gbps) technologies.
    • Satellite connections, used in remote locations, offer speeds of up to 15 Mbps.
    • Telephone line connections, such as ADSL, provide speeds of 640 Kbps upstream and up to 24 Mbps downstream.
    • Cable line connections can reach speeds of up to 160 Mbps, depending on the cable type.
    • Dedicated fiber optic lines offer speeds of up to 43 Tbps.
    • Ethernet is a common LAN connection using twisted pair cabling, with Fast Ethernet at 100 Mbps and Gigabit Ethernet at 1 Gbps.
    • Wi-Fi, based on IEEE 802.11 standards, offers speeds of up to 600 Mbps for 802.11n and uses frequencies at 2.4 GHz and 5 GHz.
    • Networking hardware includes hubs that transmit data to all attached devices, switches that transmit data only to the intended device, bridges that manage traffic between segments of a network, routers that manage traffic between networks, and access points that allow wireless devices to connect to a wired network.
    • Network topologies include star, bus, and hybrid (star-bus), with most networks using a star-bus topology.
    • Each topology has its own unique arrangement of network elements and devices.

    DHCP Address Assignment Process

    • DHCP is a client/server protocol for IP address assignment.
    • The process involves a four-packet sequence: DHCPDISCOVER, DHCPOFFER, DHCPREQUEST, and DHCPACK.
    • DHCPDISCOVER is a broadcast packet requesting an IP address from an available DHCP server.
    • DHCPOFFER is a response from the DHCP server offering an IP address and subnet mask.
    • DHCPREQUEST is the client's response to accept the offered address.
    • DHCPACK is the acknowledgment from the DHCP server, completing the transaction.
    • The lease renewal process involves a DHCPREQUEST when the lease is 50% expired and a DHCPACK from the server.
    • Common situations for lease renewal failure include server inability to honor renewal and lack of server response.
    • IPv6 provides automatic address assignment without DHCP, but DHCPv6 can still be used for address assignment and management.
    • IPv6 addresses consist of a network ID (prefix) and an interface ID.
    • IPv6 network ID can be assigned through stateless or stateful autoconfiguration or DHCPv6.
    • IPv6 interface ID can be assigned using the MAC address, randomly generated permanent or temporary identifiers, DHCPv6, or manual entry.

    Linux System Administration

    • Zcat and zmore commands are used to view the contents of a compressed file.
    • Gzip -d or gunzip commands are used to decompress files.
    • Bzip2 command cannot compress a directory full of files and has a lower compression ratio than gzip.
    • The compress command is an old compression utility with a lower compression ratio than gzip, not typically installed by default.
    • The tar command, also known as Tape Archive, is used for backups and can create, extract, and compress archives.
    • Cpio is similar to tar but supports long filenames and device files for backup and restore.
    • The dump and restore commands can be used for full and incremental backups, not typically installed by default.
    • Remote administration methods for Linux servers include telnet, SSH, and VNC.
    • Telnet is no longer installed by default on most Linux distributions and does not encrypt communications.
    • SSH is a secure replacement for telnet and allows for GUI; it is installed by default on most Linux distributions.
    • VNC is a graphical option for remote Linux system administration and uses a platform-independent protocol called Remote FrameBuffer (RFB).
    • CUPS (Common Unix Printing System) is a common printing system used on Linux computers, while LPD (Line Printer Daemon) is an older printing system. Print jobs are sent to a printer using the lp command, and the CUPS daemon manages the print queue and printer configuration.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge of system performance monitoring in Windows and Linux with this quiz. Explore tools like Windows Task Manager and Linux system monitor, and learn about commands like ps and kill in Linux.

    More Like This

    Use Quizgecko on...
    Browser
    Browser